Sciweavers

2208 search results - page 232 / 442
» Memory Practices in the Sciences
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 4 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
GI
2003
Springer
15 years 4 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
ACSC
2002
IEEE
15 years 3 months ago
Representation and Reasoning for Goals in BDI Agents
A number of agent-oriented programming systems are based on a framework of beliefs, desires and intentions (BDI) and more explicitly on the BDI logic of Rao and Georgeff. In this ...
John Thangarajah, Lin Padgham, James Harland
FOCS
2002
IEEE
15 years 3 months ago
Covering Problems with Hard Capacities
We consider the classical vertex cover and set cover problems with the addition of hard capacity constraints. This means that a set (vertex) can only cover a limited number of its...
Julia Chuzhoy, Joseph Naor
RECOMB
2001
Springer
15 years 3 months ago
Edit distance between two RNA structures
The primary structure of a ribonucleic acid (RNA) molecule is a sequence of nucleotides (bases) over the four-letter alphabet fA; C; G; Ug. The secondary or tertiary structure of ...
Guohui Lin, Bin Ma, Kaizhong Zhang